24th International Conference on Distributed Computing Systems, 2004. Proceedings. 2004
DOI: 10.1109/icdcs.2004.1281634
|View full text |Cite
|
Sign up to set email alerts
|

An autonomous and decentralized protocol for delay sensitive overlay multicast tree

Abstract: In this paper, we present a protocol for dynamically maintaining a degree-bounded delay sensitive spanning tree in a decentralized way on overlay networks. The protocol aims at repairing the spanning tree autonomously even if multiple nodes' leave operations or failures (disappearances) occur simultaneously or continuously in a specified period. It also aims at maintaining the diameter (maximum delay) of the tree as small as possible. The simulation results using ns-2 have shown that the protocol could keep re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2005
2005
2013
2013

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 11 publications
(17 citation statements)
references
References 9 publications
0
17
0
Order By: Relevance
“…The detailed comparison of MODE with the existing work is described in Ref. (4). Inheriting the advantage, MODE-m in this paper can adaptively determine the positions of mobile nodes to prevent these incapable nodes from affecting the diameters.…”
Section: Related Work and Motivationmentioning
confidence: 99%
See 2 more Smart Citations
“…The detailed comparison of MODE with the existing work is described in Ref. (4). Inheriting the advantage, MODE-m in this paper can adaptively determine the positions of mobile nodes to prevent these incapable nodes from affecting the diameters.…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…The basic idea is inspired from the protocol MODE 4) , which is one of our prior works. Mobile nodes we discuss here are nodes with low-bandwidth and less capability of computing, which are connected via wireless links to wired networks.…”
Section: Outline Of Mode For Mobilementioning
confidence: 99%
See 1 more Smart Citation
“…This is also critical when using ALM in real world applications. Multiple path approaches where the redundant paths are used in case of original path failure ( [5], [6]), or restore schemes where the overlay topology is re-established using a previously or immediately calculated restore mission ( [7], [8], [9]) are often used to realize this. The third one corresponds to the ALM schemes like [10], [11], [12], which are targeted to provide some other QoS features like bandwidth.…”
Section: Related Workmentioning
confidence: 99%
“…They are classified into the following three categories based on their policies to generate overlay topologies, (i) mesh-first approaches like [1,2], (ii) tree-first approaches like [3,4,5,6,7] and (iii) other approaches like [8]. In Ref.…”
Section: Introductionmentioning
confidence: 99%